SSL check results of mxtls.expurgate.net

NEW You can also bulk check multiple servers.

Discover if the mail servers for mxtls.expurgate.net can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Wed, 04 Sep 2019 15:28:28 +0000

The mailservers of mxtls.expurgate.net can be reached through an encrypted connection.

However, we found problems that may affect the security.

Servers

Incoming Mails

These servers are responsible for incoming mails to @mxtls.expurgate.net addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mxtls.expurgate.net
194.145.224.122
-
supported
mxtls.expurgate.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
14 s
mxtls.expurgate.net
194.145.224.123
-
supported
mxtls.expurgate.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
14 s
mxtls.expurgate.net
194.145.224.124
-
supported
mxtls.expurgate.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
14 s
mxtls.expurgate.net
194.145.224.125
-
supported
mxtls.expurgate.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
14 s
mxtls.expurgate.net
195.190.135.120
-
supported
mxtls.expurgate.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
14 s
mxtls.expurgate.net
195.190.135.121
-
supported
mxtls.expurgate.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
14 s
mxtls.expurgate.net
195.190.135.122
-
supported
mxtls.expurgate.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
14 s
mxtls.expurgate.net
195.190.135.123
-
supported
mxtls.expurgate.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
14 s
mxtls.expurgate.net
195.190.135.124
-
supported
mxtls.expurgate.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
14 s
mxtls.expurgate.net
195.190.135.125
-
supported
mxtls.expurgate.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
14 s
mxtls.expurgate.net
194.145.224.120
-
supported
mxtls.expurgate.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
14 s
mxtls.expurgate.net
194.145.224.121
-
supported
mxtls.expurgate.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
14 s

Outgoing Mails

We have not received any emails from a @mxtls.expurgate.net address so far. Test mail delivery

Certificates

First seen at:

CN=mxtls.expurgate.net,OU=Multi-Domain SSL,OU=OPS_DE,O=CYREN GmbH,street=Hardenbergplatz 2,L=Berlin,ST=Berlin,postalCode=10623,C=DE

Certificate chain
Subject
Country (C)
  • DE
Postal code
  • 10623
State (ST)
  • Berlin
Locality (L)
  • Berlin
Street
  • Hardenbergplatz 2
Organization (O)
  • CYREN GmbH
Organizational Unit (OU)
  • OPS_DE
  • Multi-Domain SSL
Common Name (CN)
  • mxtls.expurgate.net
Alternative Names
  • mxtls.expurgate.net
  • mxa.expurgate.de
  • mxa.expurgate.net
  • mxb.expurgate.de
  • mxb.expurgate.net
  • mxtls.expurgate.de
  • mxtls.expurgate.eu
  • mxtls.expurgate.org
  • mxtls.saas-sentry.com
Issuer
Country (C)
  • GB
State (ST)
  • Greater Manchester
Locality (L)
  • Salford
Organization (O)
  • Sectigo Limited
Common Name (CN)
  • Sectigo RSA Organization Validation Secure Server CA
validity period
Not valid before
2019-02-13
Not valid after
2020-04-13
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
14:6E:55:CC:0A:EC:55:D2:5B:73:B6:96:93:66:BC:10:A7:41:AA:47:D1:B0:0F:16:15:66:E3:0E:93:3A:91:09
SHA1
D9:1A:4D:42:2B:68:55:99:2E:20:58:0E:6A:C6:B8:4C:3B:FA:14:E8
X509v3 extensions
authorityKeyIdentifier
  • keyid:17:D9:D6:25:27:67:F9:31:C2:49:43:D9:30:36:44:8C:6C:A9:4F:EB
subjectKeyIdentifier
  • 2E:22:FF:88:EF:92:75:43:EA:A8:DA:85:95:3D:3B:23:96:53:A7:8A
certificatePolicies
  • Policy: 1.3.6.1.4.1.6449.1.2.1.3.4
  • CPS: https://sectigo.com/CPS
  • Policy: 2.23.140.1.2.2
crlDistributionPoints
  • Full Name:
  • URI:http://crl.sectigo.com/SectigoRSAOrganizationValidationSecureServerCA.crl
authorityInfoAccess
  • CA Issuers - URI:http://crt.sectigo.com/SectigoRSAOrganizationValidationSecureServerCA.crt
  • OCSP - URI:http://ocsp.sectigo.com
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : BB:D9:DF:BC:1F:8A:71:B5:93:94:23:97:AA:92:7B:47:
  • 38:57:95:0A:AB:52:E8:1A:90:96:64:36:8E:1E:D1:85
  • Timestamp : Feb 13 09:52:33.290 2019 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:14:7B:85:9E:E9:A7:F4:74:6E:3E:C6:71:
  • 56:EB:5C:3D:B2:76:9B:BE:A2:DF:DD:D7:2A:82:42:77:
  • EE:2D:03:24:02:21:00:81:F9:44:93:46:5E:C3:B3:9E:
  • 15:B1:81:96:18:63:80:9E:8D:E4:1C:00:40:0B:8D:48:
  • 81:FB:A9:C7:25:18:EF
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 5E:A7:73:F9:DF:56:C0:E7:B5:36:48:7D:D0:49:E0:32:
  • 7A:91:9A:0C:84:A1:12:12:84:18:75:96:81:71:45:58
  • Timestamp : Feb 13 09:52:33.343 2019 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:2D:56:4D:F1:C0:2E:E2:77:C2:64:22:6B:
  • A2:40:BE:D8:75:B5:74:D2:05:EC:AC:4E:96:64:4F:8E:
  • 08:14:66:51:02:20:25:8F:C7:FD:19:67:EF:79:A6:0A:
  • BA:C1:92:4B:F0:A6:07:B4:6A:C3:77:70:49:D7:AF:50:
  • 9C:2C:88:1B:F4:70
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : F0:95:A4:59:F2:00:D1:82:40:10:2D:2F:93:88:8E:AD:
  • 4B:FE:1D:47:E3:99:E1:D0:34:A6:B0:A8:AA:8E:B2:73
  • Timestamp : Feb 13 09:52:33.861 2019 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:C8:B6:6F:7D:14:29:32:4D:9D:41:A3:
  • 3A:62:CE:13:5E:79:6B:45:3C:35:6A:22:AA:40:68:57:
  • 67:CE:30:0E:D3:02:20:7C:EC:33:31:C8:79:4A:DB:90:
  • 87:44:78:E3:5C:73:A7:BB:D1:CA:23:72:9C:DE:AE:08:
  • B2:A4:24:0B:9E:4C:00